A RELIABLE (k, n) IMAGE SECRET SHARING SCHEME WITH LOW INFORMATION OVERHEAD

L. Bai

References

  1. [1] C.-C. Thien & J.-C. Lin, Secret image sharing, Computers & Graphics, 26 (5), 2002, 765–770.
  2. [2] G. Blakley, Safeguarding crypographic keys, Proc. AFIPS 1979 National Computer Conference, 48, Arlington, VA, 1979, 313–317.
  3. [3] A. Shamir, How to share a secret, Communications of the ACM, 22 (11), 1979, 612–613.
  4. [4] E.D. Karnin, J.W. Greene, & M.E. Hellman, On secret sharing systems, IT-29(1), 1983, 35–41.
  5. [5] K. Kurosawa, K. Okada, K. Sakano, W. Ogata, & S. Tsujii, Nonperfect secret sharing schemes and matroids, Lecture Notes in Computer Science, 765, 1994, 126–141. [Online]. Available: citeseer.ist.psu.edu/article/kurosawa94nonperfect.html
  6. [6] K. Srinathan, N. Tharani Rajan, & C. Pandu Rangan, Nonperfect secret sharing over general access structures, INDOCRYPT, 2002, 409–421.
  7. [7] A. Beimel & B. Chor, Secret sharing with public reconstruction, 44 (5), 1998, 1887–1896.
  8. [8] A. De Santis & B. Masucci, Multiple ramp schemes, 45 (5), 1999, 1720–1728.
  9. [9] M. Naor & A. Shamir, Visual cryptography, Proc. Conf. on Advances in Cryptology – Eurocrypt ’94 (A. De Santis, Ed.), Berlin, Germany, 1994, 1–12.
  10. [10] S. Cimato, R.D. Prisco, & A.D. Santis, Probabilistic visual cryptography schemes, The Computer Journal, 49 (1), 2006, 97–107.
  11. [11] C. Blundo, S. Cimato, & A.D. Santis, Visual cryptography schemes with optimal pixel expansion, Theoretical Computer Science, 38 (5), 2006, 767–772. [Online]. Available: http://eprint.iacr.org/2006/170
  12. [12] R. Lukac & K.N. Plataniotis, Bit-level based secret sharing for image encryption, Pattern Recognition, 38 (5), 2005, 767–772.
  13. [13] R. Lukac & K.N. Plataniotis, A cost-effective encryption scheme for color images, Real-Time Imaging, 11 (5–6), 2005, 454–464.
  14. [14] R. Lukac & K.N. Plataniotis, Digital image indexing using secret sharing schemes: A unified framework for single-sensor consumer electronics, IEEE Transactions on Consumer Electronics, 51 (3), 2005, 908–916.
  15. [15] R. Lukac & K.N. Plataniotis, Secure single-sensor digital camera, IEE Electronics Letters, 42 (11), 2006, 627–629.
  16. [16] L. Bai, A strong ramp secret sharing scheme using matrix projection, 2nd Int. Workshop on Trust, Security and Privacy for Ubiquitous Computing, Niagara-Falls, Buffalo, NY, 2006.
  17. [17] R.M. Capocelli, A. De Santis, L. Gargano, & U. Vaccaro, On the size of shares for secret sharing schemes, Advances in Cryptology – Crypto ’91 (J. Feigenbaum, Ed.), 576, Santa Barbara, California, USA, 1991, 101–113.

Important Links:

Go Back